Trending questions in Edureka Community

0 votes
0 answers

Can Asana handle Gantt chart dependencies, or do I need to integrate another tool?

I’m using Asana for project planning and ...READ MORE

Apr 14 in PMP by Parshvi
• 6,900 points
34 views
0 votes
0 answers

What are the risks of IPv6 scanning compared to IPv4 scanning?

IPv6 has a much larger address space ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by Nidhi
• 16,020 points
23 views
0 votes
0 answers

How does idle scanning work in Nmap?

Idle scanning is a stealth technique used ...READ MORE

Apr 14 in Cyber Security & Ethical Hacking by Anupam
• 16,780 points
30 views
0 votes
1 answer

What are the key features of OpenVAS vulnerability scanning?

OpenVAS (Open Vulnerability Assessment System) is an ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,020 points
108 views
0 votes
1 answer

How to prepare a VAPT report?

​A Vulnerability Assessment and Penetration Testing (VAPT) ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,020 points
100 views
+1 vote
3 answers

How to auto build a job in jenkins if there is any change in code on Github repository?

To automatically run build on code commit, follow ...READ MORE

Jul 31, 2019 in Jenkins by Sirajul
• 59,230 points
79,870 views
0 votes
1 answer

How does Honeypot analysis help detect scanners?

​Honeypots are decoy systems designed to mimic ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,020 points
88 views
0 votes
1 answer

How do you implement TPU-optimized convolution layers for 3D data?

You can implement TPU-optimized convolution layers for ...READ MORE

Apr 16 in Generative AI by hoor
41 views
0 votes
1 answer
0 votes
1 answer

How do firewalls detect and block scanning attempts?

​Firewalls play a crucial role in network ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,020 points
76 views
0 votes
1 answer

How do you implement per-core tensor broadcasting in TPU systems?

You can implement per-core tensor broadcasting in ...READ MORE

Apr 16 in Generative AI by simran
44 views
0 votes
1 answer

How do AI-powered scanners compare with traditional tools?

​AI-powered vulnerability scanners represent a significant advancement ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,020 points
71 views
0 votes
1 answer

How to implement adapter fusion in QLoRA for multi-task learning?

You can implement adapter fusion in QLoRA ...READ MORE

Apr 15 in Generative AI by nidhi
52 views
0 votes
1 answer

How does AI improve vulnerability detection?

​Artificial Intelligence (AI) significantly enhances vulnerability detection ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,020 points
103 views
0 votes
1 answer

How to create an attribute directive that changes element behavior on hover events?

You can follow this example. This directive ...READ MORE

Apr 10 in Java-Script by anonymous
93 views
0 votes
1 answer

How to create a pipe that converts timestamps to relative time strings (e.g., '2 hours ago')?

You can use the date-fns library for ...READ MORE

Apr 10 in Angular by anonymous
91 views
0 votes
1 answer

How can you implement static vs. dynamic sharding for TPU datasets?

You can implement static vs dynamic sharding ...READ MORE

Apr 15 in Generative AI by medha
43 views
0 votes
1 answer

How to build a directive that conditionally adds elements to the DOM based on API responses?

Structural Directive with API Condition 1. Create the ...READ MORE

Apr 10 in HTML by anonymous
74 views
0 votes
1 answer

Write code to quantize activations in a Transformer architecture using QLoRA.

You can quantize activations in a Transformer ...READ MORE

Apr 14 in Generative AI by anonymous
• 27,850 points
53 views
0 votes
1 answer

Create a function for custom parameter initialization in QLoRA fine-tuning.

You can create a custom parameter initialization ...READ MORE

Apr 14 in Generative AI by anonymous
• 27,850 points
52 views
0 votes
1 answer
0 votes
1 answer

What is CVE, and how does it help in vulnerability tracking?

​Common Vulnerabilities and Exposures (CVE) is a ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,020 points
72 views
0 votes
1 answer

How does Metasploit exploit vulnerabilities?

​Metasploit is a powerful open-source framework developed ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,020 points
29 views
0 votes
1 answer

How to build a directive that listens for specific keyboard shortcuts?

You can use the @HostListener decorator to ...READ MORE

Apr 10 in Angular by anonymous
64 views
0 votes
1 answer

How would you perform rank tuning in QLoRA for a large language model?

You can perform rank tuning in QLoRA ...READ MORE

Apr 14 in Generative AI by anonymous
• 27,850 points
44 views
0 votes
1 answer

Create a pipeline for end-to-end QLoRA fine-tuning using PyTorch Lightning.

You can create an end-to-end QLoRA fine-tuning ...READ MORE

Apr 14 in Generative AI by anonymous
• 27,850 points
44 views
0 votes
1 answer

How can One-Shot Learning be used to detect signature forgery with minimal genuine signature samples for training?

You can use One-Shot Learning for signature ...READ MORE

Apr 14 in Generative AI by anonymous
• 27,850 points
43 views
0 votes
1 answer

How does Nessus perform vulnerability assessments?

​Nessus, developed by Tenable, is a widely ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,020 points
27 views
0 votes
1 answer

How do you prioritize vulnerabilities in a risk-based approach?

​In a risk-based approach to vulnerability management, ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,020 points
68 views
0 votes
1 answer

How to implement a directive that manages focus on dynamically added elements?

To implement a directive that manages focus ...READ MORE

Apr 10 in Angular by anonymous
61 views
0 votes
1 answer

How to create a custom directive that integrates with external charting libraries?

Compact Directive for External Chart Integration import { ...READ MORE

Apr 10 in Angular by anonymous
57 views
0 votes
1 answer

How to measure the impact of dynamic quantization in QLoRA on large datasets?

You can measure the impact of dynamic ...READ MORE

Apr 14 in Generative AI by anonymous
• 27,850 points
36 views
0 votes
1 answer

How to develop a pipe that formats phone numbers based on locale?

You can use the libphonenumber-js library for ...READ MORE

Apr 10 in Angular by anonymous
54 views
0 votes
1 answer

How to create a structural directive that renders elements based on user permissions?

Here's how to create a structural directive ...READ MORE

Apr 10 in Node-js by anonymous
78 views
0 votes
1 answer

How to implement a pipe that capitalizes the first letter of each word in a string?

To create a pipe in Angular that ...READ MORE

Apr 10 in Angular by anonymous
53 views
0 votes
1 answer

Write a script to log validation perplexity during QLoRA training.

You can log validation perplexity during QLoRA ...READ MORE

Apr 14 in Generative AI by anonymous
• 27,850 points
32 views
0 votes
1 answer

How does quantization noise affect model performance in QLoRA-tuned models?

You can analyze how quantization noise affects ...READ MORE

Apr 14 in Generative AI by anonymous
• 27,850 points
32 views
0 votes
1 answer

How to develop a directive that modifies element styles based on form validation status?

Here's a concise directive that automatically applies ...READ MORE

Apr 10 in Angular by anonymous
52 views
0 votes
1 answer

How to implement a directive that adds tooltips to form controls dynamically?

Custom Tooltip Directive 1. Create the Directive import { ...READ MORE

Apr 10 in Angular by anonymous
49 views
0 votes
1 answer

How would you monitor gradient sparsity in QLoRA training?

You can monitor gradient sparsity in QLoRA ...READ MORE

Apr 14 in Generative AI by anonymous
• 27,850 points
27 views
0 votes
1 answer

How does AI automate enumeration attacks?

​Artificial Intelligence (AI) has revolutionized the landscape ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,020 points
53 views
0 votes
1 answer

What are the phases of the vulnerability-management lifecycle?

​The vulnerability management lifecycle is a continuous, ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,020 points
52 views
0 votes
1 answer

How to use host bindings to bind properties to the host element in a component?

In Angular (2+), the @HostBinding() decorator allows ...READ MORE

Apr 10 in Node-js by anonymous
70 views
0 votes
1 answer

How do zero-day vulnerabilities impact security?

​Zero-day vulnerabilities are security flaws in software ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,020 points
50 views
0 votes
1 answer

How to implement a directive that toggles element visibility with animations?

Custom Directive with Angular Animations 1. Define the ...READ MORE

Apr 10 in Node-js by anonymous
63 views
0 votes
1 answer

How to implement a directive that auto-saves form data periodically?

To create a directive that automatically saves ...READ MORE

Apr 10 in Node-js by anonymous
61 views
0 votes
1 answer

How to dynamically inject components into the DOM using @Component?

You need to use ComponentFactoryResolver and ViewContainerRef. ...READ MORE

Apr 10 in Node-js by anonymous
59 views
0 votes
1 answer

How to manage component lifecycle hooks for resource cleanup?

You manage component lifecycle hooks—especially ngOnDestroy()—to perform ...READ MORE

Apr 10 in Node-js by anonymous
57 views
0 votes
1 answer

What are the best enumeration countermeasures?

​Enumeration attacks involve malicious actors systematically probing ...READ MORE

Apr 10 in Cyber Security & Ethical Hacking by CaLLmeDaDDY
• 30,020 points
37 views
0 votes
0 answers

What are fuzzing techniques in vulnerability research?

Fuzzing involves sending random or malformed inputs ...READ MORE

Apr 11 in Cyber Security & Ethical Hacking by Anupam
• 16,780 points
34 views